When scanning for IP addresses, you can only identify the IP address of a host that is on and running an operating system.
在扫描ip地址的时候,您只能识别那些处于开机状态、并且正在运行某种操作系统的主机的IP地址。
Port scanning is used to check whether ports on a given host are open.
端口扫描用来检查给定主机上的端口是否打开。
A port scanning attack is performed through the structured and systematic scanning of a host.
端口扫描攻击通过对主机进行系统的结构化扫描来实现。
Provide the scanning software with the IP or host names of active systems.
向扫描软件提供活动系统的主机名和IP。
As described earlier, a single pass of either the host or port scanning information is only useful for the instant in time when the scan was executed.
如前所述,如果只进行一次扫描,那么主机或者端口扫描信息仅在执行该次扫描的时候是有用的。
Even on switched networks, you can gain some valuable information by running the packet-scanning tool on the host you want to investigate.
即使在交换的网络中,通过对您所希望研究的主机运行数据包扫描工具,您就可以获得一些有价值的信息。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
Down and move around the instrument, laser scanning of the surrounding environment, observing the eye by the host window.
上下左右移动仪器,对周围环境进行激光扫描,眼睛通过主机视窗观察。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
The detecting active host is most important steps to some port scanning or determining host OS technologies.
活动主机探测是许多安全扫描的首要步骤,它的准确性对扫描技术至关重要。
The detecting active host is most important steps to some port scanning or determining host OS technologies.
活动主机探测是许多安全扫描的首要步骤,它的准确性对扫描技术至关重要。
应用推荐